| Question | Answer |
| A ___________ is a specially formatted encrypted message that validates the information the CA requires to issue a digital certificate. | Certificate Signing Request (CSR) |
| ____________ performs a real-time lookup of a digital certificate's status. | Online Certificate Status Protocol (OCSP) |
| ________________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. | Session Keys |
| Which of these is considered the weakest cryptographic transport protocol? | SSL v2.0 |
| The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ________. | Digital Certificate |
| A digital certificate associates ____________. | the user's identity with his public key |
| Digital certificates can be used for each of these EXCEPT ____________. | to verify the authenticity of the Registration Authorizer |
| An entity that issues digital certificates is a ___________. | Certificate Authority (CA) |
| A centralized directory of digital certificates is called a(n) ______________. | Certificate Repository (CR) |
| In order to ensure a secure cryptographic connection between a web browser and a web server, a(n) _________ would be used. | Server Digital Certificate |
| A digital certificate that turns the address bar green is a(n) ____________. | Extended Validation SSL Certificate |
| The __________ party trust model supports CA. | Third (3rd) |
| Public Key Cryptography Standards (PKCS) _______________. | are widely accepted in the industry |
| Which statement is NOT true regarding hierarchical trust models? | It is designed for use on a large scale |
| Which statement is NOT where keys can be stored? | in digests |
| Public key infrastructure (PKI) ____________. | is the management of digital certificates |
| A(n) _______________ is a published set of rules that govern the operation of a PKI. | certificate policy (CP) |
| Which of these is NOT part of the certificate life cycle? | Authorization |
| ________________ refers to a situation in which keys are managed by a third party, such as a trusted CA. | Key escrow |
| ________________ is a protocol for securely accessing a remote computer. | Secure Shell (SSH) |
Want to create your own Flashcards for free with GoConqr? Learn more.